A pentest reporting tool written in Python. Free yourself from Microsoft Word.
☆14Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for writehat
Users that are interested in writehat are comparing it to the libraries listed below
Sorting:
- ☆40Updated this week
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆31Sep 2, 2023Updated 2 years ago
- huntr.dev public disclosures/hacktivity watcher☆16Nov 5, 2023Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Nov 2, 2025Updated 3 months ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- Secret Magpie - Secret Detection Tool☆244Jul 10, 2024Updated last year
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆28Apr 30, 2025Updated 10 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- Search public IP owner through ARIN☆60May 23, 2025Updated 9 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Oct 5, 2023Updated 2 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Automated XSS Vulnerability Finder☆34Nov 20, 2020Updated 5 years ago
- An nmap script to produce target lists for use with various tools.☆33May 13, 2021Updated 4 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- MiSide: Step Into The Mysterious MiSide World☆19Dec 3, 2025Updated 2 months ago
- Sends Sentry notifications to Mattermost Open Source Chat☆10Jan 10, 2023Updated 3 years ago
- A web-based serverless application which works on a decentralized system for handling transactions between users ruling out the utilizati…☆13May 6, 2022Updated 3 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- Burp Suite plugin for scanning SSL vulnerabilities.☆44Feb 25, 2022Updated 4 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Functional composable pipelines allowing clean separation of the business logic and its implementation☆11Sep 6, 2025Updated 5 months ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- ☆44Sep 21, 2021Updated 4 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 10 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Registry Explorer bookmark definitions☆44Dec 19, 2024Updated last year